ÐÅÏ¢°²È«Öܱ¨-2020ÄêµÚ06ÖÜ

°ä²¼¹¦·ò 2020-02-11

> ±¾Öܰ²È«Ì¬ÊÆ×ÛÊö



2020Äê02ÔÂ03ÈÕÖÁ09ÈÕ¹²ÊÕ¼°²È«·ì϶45¸ö£¬ÖµµÃ¹Ø×¢µÄÊÇQEMU libslirpÔ½½ç¶Ñ½Ó¼û·ì϶; MikroTik WinBox CVE-2020-5720Ŀ¼±éÀú·ì϶£»Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öûº³åÇøÒç¶Âí½Å£»Squid ext_lm_group_aclÔ½½çд·ì϶£»Clam AntiVirus DLP»º³åÇøÒç¶Âí½Å¡£


±¾ÖÜÖµµÃ¹Ø×¢µÄÍøÂ簲ȫÊÂÎñÊÇÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶´óÁ¿Óû§Êý¾Ý£»ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È£»¹¥»÷ÕßÀÄÓÃBitbucket·þÎñ£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úϰȾ¶ñÒâÈí¼þ£»Ë¼¿Æ½¨¸´·¢ÏÖºÍ̸£¨CDP£©ÖÐÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸£»×êÑÐÈËÔ±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐ佨¸´µÄºóÃÅ·ì϶¼°PoC¡£


ƾ¾ÝÒÔÉÏ×ÛÊö£¬±¾Öܰ²È«ÍþвΪÖС£


>³ÁÒª°²È«·ì϶Áбí




1. QEMU libslirpÔ½½ç¶Ñ½Ó¼û·ì϶


QEMU libslirp´æÔÚÔ½½ç¶Ñ½Ó¼û·ì϶£¬ÔÊÐí±¾µØ¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇó£¬ÒÔHOSTÉϵÄQEMU¹ý³Ì¸ßµÍÎÄÖ´ÐÐËÁÒâ´úÂë¡£


https://www.openwall.com/lists/oss-security/2020/02/06/2



2. MikroTik WinBox CVE-2020-5720Ŀ¼±éÀú·ì϶


MikroTik WinBox´æÔÚ°²È«·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɽøÐÐĿ¼±éÀú¹¥»÷£¬Ð´ËÁÒâÎļþµ½ÏµÍ³¡£


https://www.tenable.com/security/research/tra-2020-07



3. Cisco NX-OS Software Cisco Discovery Protocol×ֶδ¦Öûº³åÇøÒç¶Âí½Å


Cisco NX-OS Software´¦ÖÃCDPÐÂÎÅ×ֶδæÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»ò¿ÉÖ´ÐÐËÁÒâ´úÂë¡£


https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200205-nxos-cdp-rce



4. Squid ext_lm_group_aclÔ½½çд·ì϶


Squid ext_lm_group_acl½âÎöNTLMÑé֤ʹ´¦´æÔÚÔ½½çд·ì϶£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ɻñÈ¡Ãô¸ÐÐÅÏ¢»òÕß½øÐлؾø·þÎñ¹¥»÷¡£


http://www.squid-cache.org/Advisories/SQUID-2020_3.txt



5. Clam AntiVirus DLP»º³åÇøÒç¶Âí½Å


Clam AntiVirus DLPÄ £¿é´æÔÚ»º³åÇøÒç¶Âí½Å£¬ÔÊÐíÔ¶³Ì¹¥»÷ÕßÄܹ»ÀûÓ÷ì϶Ìá½»ÌØÊâµÄÒªÇ󣬿ÉʹÀûÓ÷¨Ê½±ÀÀ£»òÖ´ÐÐËÁÒâ´úÂë¡£


https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html


> ³ÁÒª°²È«ÊÂÎñ×ÛÊö


1¡¢ÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶´óÁ¿Óû§Êý¾Ý


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ƾ¾ÝNaked SecurityµÄÒ»·Ý»ã±¨£¬ÔÚÏß¹¤×÷ÖÎÀíÍøÕ¾Trelloй¶ÁË´óÁ¿Óû§µÄ¸öÈËÊý¾Ý£¬Ô̺¬ÐÕÃû¡¢µØÖ·¡¢»úÄÜÆÀ¼¶ºÍ¹«Ë¾ÅàѵÊÓÆµµÈ¡£Ð¹Â¶µÄÔ­ÒòÊDz¿ÃÅÓû§ÃýÎ󵨽«ÆäTrelloÃæ°åÅäÖÃΪpublic£¬ÕâʹµÃÈκÎÈ˶¼Äܹ»²é¿´ÆäÖеÄÄÚÈÝ£¬ÉõÖÁGoogleÖ®ÀàµÄËÑË÷ÒýÇæÄܹ»½«Ãæ°åÖеÄÄÚ°üÈÝÈëË÷Òý£¬½ö±ØÒªÍ¨¹ýÒ»ÖÖ³ÆÎª¡°dork¡±µÄÌØÊâÀàÐͼ´¿ÉËÑË÷µ½¡£


Ô­ÎÄÁ´½Ó£º

https://www.techworm.net/2020/02/trello-search-exposes-private-data.html


2¡¢ÃÀ¹ú·À²¿Îª¹ú·À³Ð°üÉÌÈ·¶¨Ê×Ì×ÍøÂ簲ȫ³ß¶È


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


ÃÀ¹ú·À²¿1ÔÂ31ÈÕÕýʽ°ä²¼ÍøÂ簲ȫ³ÉÊì¶ÈÄ£ÐÍÈÏÖ¤£¨CMMC£©¿ò¼Ü1.0°æ±¾¡£¹ú·À²¿°ä·¢£¬µ½2026Äê¹ú·À³Ð°üÉÌÔڻظõ±¾Ö²É¹º´òËãµÄÌá°¸ÒªÇóʱ£¬±ØÐëÂú×ã¸ù»ùµÄÍøÂ簲ȫ³ß¶È¡£Ëæ×ÅCMMCµÄÍÆ³ö£¬¹ú·À²¿µ«Ô¸Í¨¹ýÌá¸ß¹ú·À¹¤Òµ»ù´¡£¨DIB£©·Ö°üÉ̵ÄÍøÂ簲ȫ³ï±¸Ë®Æ½£¬À´¼ÓÇ¿¶Ô¹©¸øÁ´Î´·ÖÀàÐÅÏ¢£¨Áª¹úºÏͬÐÅÏ¢£¨FCI£©ºÍÊÜ¿ØÎ´·ÖÀàÐÅÏ¢£¨CUI£©£©µÄ±£»¤¡£CMMCÖ¼ÔÚͨ¹ýʹÓÃ5ÖÖ¼¶´ËÍâÈÏÖ¤À´¼ò»¯´óÐͺÍÓ×Ð͹ú·À³Ð°üÉ̵ÄÍøÂç¾ÍÐ÷ÐÔÈÏÖ¤£¬³ÁµãÊÇÍøÂ簲ȫʵ¼ÊºÍÁ÷³Ì¡£


Ô­ÎÄÁ´½Ó£º


https://www.bleepingcomputer.com/news/security/dod-to-require-cybersecurity-certification-from-defense-

contractors/


3¡¢¹¥»÷ÕßÀÄÓÃBitbucket·þÎñ£¬Òѵ¼ÖÂ50¶àÍòÖ÷»úϰȾ¶ñÒâÈí¼þ


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¹¥»÷ÕßÔÚÀÄÓôúÂëÍйܷþÎñBitbucket´æ´¢7ÖÖ¶ñÒâÈí¼þpayload£¬¸Ã¹¥»÷»î¶¯ÒÑÔÚÈ«ÇòÁìÓòÄÚϰȾÁ˳¬¹ý50Íǫ̀ÉÌÓÃÍÆËã»ú¡£Æ¾¾Ý°²È«³§ÉÌCybereason°ä²¼µÄÒ»·Ý»ã±¨£¬¹¥»÷Õß²¿Êðµ½Ö¸±êϵͳµÄ¶ñÒâpayloadÔ̺¬Predator¡¢Azorult¡¢Evasive Monero Miner¡¢ÀÕË÷Èí¼þSTOP¡¢Vidar¡¢Amadey botºÍIntelRapid¡£¸Ã¹¥»÷»î¶¯ÖØÒªÕë¶ÔѰÕÒµÁ°æÃ³Ò×Èí¼þ£¨ÀýÈçAdobe Photoshop¡¢Microsoft OfficeµÈ£©µÄÓû§¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/bitbucket-abused-to-infect-500-000-hosts-with-malware-cocktail/


4¡¢Ë¼¿Æ½¨¸´·¢ÏÖºÍ̸£¨CDP£©ÖÐÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸


GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾



ÎïÁªÍø°²È«¹«Ë¾ArmisÔÚ˼¿Æ·¢ÏÖºÍ̸£¨CDP£©Öз¢ÏÖÎå¸ö¸ßΣ·ì϶£¬Ó°ÏìÊý°ÙÍòÉ豸¡£CDPÊÇ˼¿ÆÉ豸ʹÓõÄרÓеÚ2²ã£¨Êý¾ÝÁ´Â·²ã£©ºÍ̸£¬ÓÃÓÚ·¢ÏÖ±¾µØÍøÂçÉÏµÄÆäËü˼¿ÆÉ豸¡£Ä¬ÈÏÇé¿öÏ£¬ÏÕЩËùÓÐ˼¿Æ²úÆ·£¨Ô̺¬Â·ÓÉÆ÷¡¢»¥»»»úÒÔ¼°IPµç»°ºÍÉãÏñ»ú£©¾ùÆôÓô˺Í̸¡£ÕâÎå¸ö·ì϶±»³ÆÎªCDPwn£¬Ô̺¬ËĸöÔ¶³Ì´úÂëÖ´Ðзì϶£¨CVE-2020-3110¡¢CVE-2020-3111¡¢CVE-2020-3118¡¢CVE-2020-3119£©ºÍÒ»¸ö»Ø¾ø·þÎñ·ì϶£¨CVE-2020-3120£©¡£´ÓǰʮÄêÖа䲼µÄ˼¿Æ¹Ì¼þ°æ±¾¾ùÊܵ½ÕâЩ·ì϶µÄÓ°Ï죬ÕâЩ·ì϶¿ÉÄÜÊ¹ÉøÈëµ½ÆóÒµÍøÂçÖеı¾µØ¹¥»÷Õß¿ÉÄÜÖ´ÐÐÖÐÑëÈ˹¥»÷¡¢¼à¶½ÓïÒô»òÊÓÆµºô½Ó×¢ÍøÂçºÍй©Êý¾ÝÒÔ¼°·ÛËéÍøÂç·Ö¶Î¡£Ä¿Ç°Ë¼¿ÆÒѾ­°ä²¼ÁËÓйزúÆ·µÄ¹Ì¼þ¸üÐÂÀ´½¨¸´ÕâЩ·ì϶¡£



Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/cisco-patches-critical-cdp-flaws-affecting-millions-of-devices/



5¡¢×êÑÐÈËÔ±Åû¶º£Ë¼Ð¾Æ¬ÖÐÉÐ佨¸´µÄºóÃÅ·ì϶¼°PoC



GA»Æ½ð¼×¡¤(ÖйúÇø)¹Ù·½ÍøÕ¾


¶íÂÞ˹°²È«×¨¼ÒVladislav Yarmak°ä²¼ÁËËûÔÚº£Ë¼Ð¾Æ¬Öз¢ÏֵĺóÃÅ»úÔìµÄ¼¼Êõϸ½Ú£¬²¢°µÊ¾ÓÉÓÚ¶Ô¹©¸øÉ̲»×ãÐÅÀµ£¬ËûûÓÐÏòº£Ë¼Åû¶¸Ã·ì϶¡£¸ÃºóÃÅ»úÔìÄܹ»Ê¹¹¥»÷Õß»ñµÃroot shell½Ó¼ûȨÏÞ²¢ÆëÈ«½ÚÔìÉ豸£¬¾ßÌåÀ´Ëµ£¬¹¥»÷Õß¿ÉÄÜÀûÓà ºóÃÅͨ¹ýÔÚTCP¶Ë¿Ú9530ÉÏÏò»ùÓÚº£Ë¼Ð¾Æ¬µÄÉ豸·¢ËÍһϵÁкÅÁÕâЩºÅÁîÔÊÐí¹¥»÷ÕßÔÚÉ豸ÉÏÆôÓÃTelnet·þÎñ£¬¶øºó¹¥»÷ÕßÄܹ»Ê¹ÓÃÁù¸öTelnetÍ´´¦Ö®Ò»µÇ¼£¬²¢»ñµÃ¶ÔrootÕÊ»§µÄ½Ó¼ûȨÏÞ¡£Yarmak»¹ÔÚgithubÉϰ䲼Á˸÷ì϶µÄPoC´úÂë¡£



Ô­ÎÄÁ´½Ó£º

https://securityaffairs.co/wordpress/97367/hacking/hisilicon-chips-backdoor.html